Poland is facing a rapidly escalating cyber threat, with the Deputy Minister of Digital Affairs, Paweł Olszewski, reporting a 150% increase in cyberattacks in 2025 compared to the previous year. This amounted to 270,000 documented incidents. The most alarming of these was an unprecedented, coordinated cyberattack in December 2025 against the nation's energy infrastructure. The attack targeted a combined heat and power (CHP) plant serving nearly 500,000 customers, as well as multiple wind and solar farms. While the attack was ultimately thwarted before it could disrupt the electricity supply, Polish authorities, including CERT Polska, have labeled it a "significant escalation." The government believes the attack was carried out by a single, sophisticated threat actor, with strong suspicion falling on groups linked to Russian intelligence services, highlighting the growing threat of state-sponsored attacks on critical infrastructure in NATO countries.
Attack Type: Coordinated Cyberattack on Critical Infrastructure (ICS/OT) Target: Polish energy sector, including a CHP plant and renewable energy farms. Timeline: December 2025 Attribution: Suspected Russian state-sponsored actor Impact: Attempted sabotage and disruption of energy supply.
The attack is significant not just for its scale, but for its coordinated nature, targeting multiple components of the energy grid simultaneously. This suggests a well-resourced and highly capable adversary with deep knowledge of Industrial Control Systems (ICS) and Operational Technology (OT) environments. The Polish government's decision to publicly release a technical report on the attack is a rare move, indicating the severity of the threat and a desire to enlist the global cybersecurity community's help in analyzing and defending against this new level of aggression.
While the specific technical details from the government report are not fully detailed in the news, attacks on energy infrastructure often involve these TTPs:
T1566 - Phishing) or exploiting vulnerabilities in internet-facing systems. (T1190 - Exploit Public-Facing Application).T0886 - Remote Services).T0829 - Network Sniffing).T0831 - Manipulation of View, T0832 - Manipulation of Control).The coordinated nature of the attack across a CHP plant and renewable farms suggests the attacker had broad access and was attempting to cause a widespread, systemic failure.
Strict segmentation between IT and OT networks is the most critical defense for preventing attackers from pivoting to control systems.
Use application allowlisting on critical OT systems like HMIs and engineering workstations to prevent unauthorized code execution.
Monitor and filter all traffic crossing the IT/OT boundary, allowing only expected protocols and connections.
Develop and test an OT-specific incident response plan that includes steps for safe shutdown and manual operation.
The most fundamental defense against an attack like the one on Poland's energy grid is robust network isolation and segmentation, specifically between the Information Technology (IT) and Operational Technology (OT) networks. This should be implemented using the Purdue Model as a guide. A properly configured Industrial DMZ (IDMZ) should sit between the IT and OT environments, with strict firewall rules that deny all traffic by default. All connections initiated from the IT network into the OT network should be prohibited. Data should be passed through application-layer proxies in the IDMZ. This architecture prevents an attacker who compromises the corporate IT network from being able to directly scan, access, or attack the sensitive PLCs and control systems in the OT environment, effectively containing the threat to the less critical network.
To detect malicious activity within the OT network itself, energy operators must deploy specialized OT-aware Network Traffic Analysis. Unlike IT tools, these solutions understand industrial protocols (e.g., Modbus, DNP3, IEC 61850). They passively monitor network traffic to baseline normal operations—what PLCs talk to which HMIs, what commands are normal, etc. The system would then generate a high-priority alert for any anomalous activity, such as: an engineering workstation in one plant attempting to communicate with a PLC in another, a PLC receiving a 'stop' command outside of a scheduled maintenance window, or the appearance of non-industrial traffic like SMB or RDP within the control network. This provides visibility into malicious actions before they can cause a physical impact.
Given the potential for physical consequences, a standard IT incident response plan is insufficient. Energy operators need a specific, well-rehearsed OT Incident Response Plan. This plan must be developed jointly by cybersecurity staff, control engineers, and plant operators. It must include clear criteria for when to enact a safe, emergency shutdown of physical processes. The plan should outline procedures for failing over to manual control and isolating compromised network segments without jeopardizing safety. Contact lists must include not only the CISO and IT team but also plant managers and on-site engineers. Regular tabletop exercises that simulate scenarios like the Poland attack are essential to ensure that all stakeholders know their roles and can act decisively under pressure to protect both the grid and human life.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats